New ClickFix Variant Uses Rundll32 and WebDAV to Evade PowerShell Detection

By Published On: March 31, 2026

The landscape of cyber threats continuously shifts, forcing security professionals to adapt and evolve their defenses. A critical new development demands immediate attention: a more sophisticated variant of the ClickFix attack technique is actively targeting Windows users. This iteration marks a concerning departure from previous methods, leveraging built-in system components to execute malicious payloads with alarming stealth, bypassing traditional PowerShell detection mechanisms. Understanding this new threat, its methodology, and effective mitigation strategies is paramount for protecting your digital infrastructure.

Understanding the ClickFix Evolution

Earlier versions of the ClickFix attack were relatively straightforward in their execution, often relying on PowerShell scripts or the mshta.exe utility to deliver and run malicious commands. While effective for a time, these techniques became increasingly subject to detection by modern endpoint detection and response (EDR) solutions and security policies that monitor PowerShell activity closely. Attackers, ever resourceful, have engineered a new approach to evade these established defenses.

The new ClickFix variant demonstrates a significant leap in sophistication. Instead of the more common PowerShell or mshta, it now exploits two integral Windows components: rundll32.exe and WebDAV. This shift allows the malicious activity to blend in with legitimate system operations, making it significantly harder to spot without advanced telemetry and behavioral analysis.

How the New ClickFix Variant Operates

The core of this new attack vector lies in its abuse of legitimate Windows functionalities:

  • Rundll32.exe Abuse: The rundll32.exe program is a legitimate Windows utility designed to run functions from DLL (Dynamic Link Library) files. Malicious actors frequently misuse it to execute arbitrary code. In the context of ClickFix, it’s employed to initiate the exploitation chain without directly invoking more heavily monitored processes like PowerShell. This method provides a “living off the land” approach, utilizing existing system binaries to carry out malicious tasks, thus reducing its footprint and increasing its stealth.
  • WebDAV for Payload Delivery: WebDAV (Web Distributed Authoring and Versioning) is an extension of HTTP that allows users to collaboratively edit and manage files on remote web servers. While legitimate for file sharing and collaboration, the ClickFix variant weaponizes WebDAV as a clandestine channel for delivering its harmful payloads. By hosting malicious files on a WebDAV server, attackers can fetch and execute them using rundll32.exe, effectively bypassing network perimeter defenses that might scrutinize direct malicious file downloads. This technique is particularly concerning because WebDAV traffic often goes unnoticed as it operates over standard HTTP/HTTPS ports, blending with normal web activity.

This combined approach allows the ClickFix variant to achieve payload delivery and execution quietly, significantly complicating detection efforts for security teams primarily focused on PowerShell script analysis or traditional malware signatures.

Remediation Actions and Proactive Defense

Given the stealthy nature of this new ClickFix variant, a multi-layered defense strategy is essential. Reacting effectively requires both proactive measures and robust detection capabilities:

  • Enhanced Endpoint Monitoring: Implement advanced EDR solutions capable of behavioral analysis. Focus on monitoring the execution of rundll32.exe, paying close attention to its command-line arguments and any unusual child processes spawned. Look for instances where rundll32.exe is calling functions from unfamiliar DLLs or interacting with network resources in an atypical manner.
  • Network Traffic Analysis for WebDAV: Configure network intrusion detection systems (NIDS) and firewalls to scrutinize WebDAV traffic (often over HTTP/HTTPS). While blocking all WebDAV might not be feasible for all organizations, monitoring for unusual connection patterns, large transfers from unknown sources, or connections to suspicious external IP addresses is critical. Consider implementing SSL/TLS decryption to inspect encrypted WebDAV traffic.
  • Principle of Least Privilege: Enforce strict adherence to the principle of least privilege for all user accounts and applications. Restricting what users and processes can execute and access reduces the potential impact of a successful compromise.
  • Regular Software Updates and Patching: Ensure all operating systems, applications, and security software are kept up-to-date with the latest patches. While this specific attack leverages built-in components, known vulnerabilities in other systems could serve as initial entry points.
  • User Awareness Training: Educate users about phishing attempts and social engineering tactics that might trick them into initiating the infection chain. Even the most sophisticated technical controls can be bypassed by human error.
  • Application Whitelisting: Consider implementing application whitelisting policies to control which executables, including rundll32.exe, are allowed to run and from which locations. This can severely restrict an attacker’s ability to execute arbitrary code.

Relevant Tools for Detection and Mitigation

Employing the right security tools is crucial for detecting and mitigating threats like the new ClickFix variant:

Tool Name Purpose Link
Sysmon Advanced activity monitoring, including process creation, network connections, and WMI events. Configurable to detectrundll32.exe anomalies. https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon
Elastic Security (SIEM/XDR) Comprehensive security information and event management, extended detection and response. Collects, analyzes, and correlates logs to identify threats, including behavioral anomalies around rundll32.exe and WebDAV. https://www.elastic.co/security
Zeek (Bro Network Security Monitor) Powerful network analysis framework for deep packet inspection and traffic logging. Can be configured to detect suspicious WebDAV activity or connections to known malicious IPs. https://zeek.org/
CrowdStrike Falcon Insight Endpoint Detection and Response (EDR) platform with behavioral AI to detect malicious activity, including living-off-the-land techniques and rundll32.exe abuse. https://www.crowdstrike.com/products/falcon-platform/endpoint-protection/edr

Conclusion

The emergence of this new ClickFix variant underscores a fundamental truth in cybersecurity: threat actors will always seek out the path of least resistance. By repurposing legitimate Windows components like rundll32.exe and WebDAV, they aim to bypass established security controls and operate under the radar. For IT professionals, security analysts, and developers, this means moving beyond signature-based detection and embracing advanced behavioral analysis, comprehensive network monitoring, and stringent endpoint protection. Staying informed, continuously updating your defenses, and fostering a strong security posture are your best defenses against these evolving and increasingly sophisticated threats.

Share this article

Leave A Comment